SlideShare a Scribd company logo
1 of 2
Download to read offline
New FAR Clause Establishes Minimum Data Security Requirements for
September 4, 2012      Federal Contractors
 Government Contracts Law Client Alert
 This Alert provides only        With Congress unable to pass cybersecurity legislation by the August recess, the
 general information and         executive agencies are proceeding to regulate government contractors with access to
 should not be relied upon as    government information. Specifically, on August 24, 2012, the Federal Acquisition
                                 Regulation (FAR) Council proposed a new clause requiring contractors to maintain
 legal advice. This Alert may
                                 minimum data protection standards. Comments on the proposal are due October 23,
 be considered attorney          2012. As explained below, GSA already has in place cybersecurity standards for its
 advertising under court and     contractors, and DoD has proposed its own set of rules. These specific agency rules
 bar rules in certain            take precedent over this new FAR clause.
 jurisdictions.
                                 Once final, the new FAR clause will apply to civilian, DoD and NASA contracts exceeding
                                 the simplified acquisition threshold ($150,000), including commercial acquisitions. The
 For more information, contact
                                 clause must be flowed down to subcontracts at any tier. The new clause, which will be in
 your Patton Boggs LLP           FAR Part 52.204, identifies seven basic safeguards for contractor information systems
 attorney or the author listed   through which nonpublic information generated by or for government either resides or
 below.                          transits. The basic safeguards are:

                                 1. Government information may not be processed on computers without access control or
Mary Beth Bosco                  located in public areas. Similarly, government information cannot be posted on a public
mbbosco@pattonboggs.com          website. If posted to a web site, the site must control access either through user
WWW.PATTONBOGGS.COM
                                 identification or password, user certificate or other technical means, and must provide
                                 protection via use of security technologies.

                                 2. Electronic information may be transmitted only on systems that utilize technologies and
                                 processes that provide the best level of security and privacy available, given facilities,
                                 conditions and environment.

                                 3. Transmission by voice or fax may only occur when the sender has a reasonable
                                 assurance that access is limited to authorized recipients.

                                 4. Systems must be protected by at least one level of physical barrier and one level of
                                 electronic barrier, such as lock and key in conjunction with a password, when not in the
                                 direct control of the individual user.

                                 5. Media that is being released or discarded must be cleared and sanitized. Overwriting is
                                 an acceptable method of sanitizing, and the clause refers to the National Institute of
                                 Standards and Testing's (NIST) protocols for clearing computers. NIST Publication 800-88,
                                 Guidelines for Media Sanitization.

                                 6. The contractor must provide at least the following means of intrusion protection: Current
                                 and regularly updated malware protection, such as anti-virus software and anti-spyware
                                 software; and prompt application of security-related upgrades and patches.
7. Information may only be transferred to those subcontractors with a contractual need to
 have the information and who employ the safeguards described in the clause.

 While the clause’s requirements are very general, covered contractors will need to review
 not just their hardware and software systems, but their facilities, employee practices,
 record-keeping systems, and subcontract relationships in order to ensure compliance.
 For example, contractors should make sure they have policies in place so that employees
 working from home comply with the clause’s security requirements.

 In addition, government contractors must be aware that GSA already has more fulsome
 cybersecurity regulations in place, and that DOD has proposed a comprehensive set of
 rules. In brief, GSA’s regulations require contractors to have an IT security plan for each
 contract that is approved by the Contracting Officer. Contractors must also supply evidence
 of either a self or third-party-certified security authorization, the components of which are
 defined by GSA’s regulations. The regulations also contain notification requirements for
 cyber breaches and GSA inspection rights.

 DOD's proposal mandates reporting of cyber incidents affecting designated DOD
 information within 72 hours of discovery. In addition to incident reporting, contractors will
 need to take immediate action to support forensic activities. These actions include an
 immediate review of the system to identify compromised computers, servers and user
 accounts; identification of the specific DOD information that has been affected; and
 preservation of the known affected systems and any corresponding capture data. In the
 event DOD determines to perform its own damage assessment, the contractor will be
 required to comply with all information requests and cooperate with DOD's investigation.
 The DOD regulations are not expected to become final before the end of the year.




  This Alert provides only general information and should not be relied upon as legal advice. This Alert may also be considered
                              attorney advertising under court and bar rules in certain jurisdictions.


WASHINGTON DC | NEW JERSEY | NEW YORK | DALLAS | DENVER | ANCHORAGE | DOHA, QATAR | ABU DHABI, UAE | RIYADH, SAUDI ARABIA

More Related Content

What's hot

PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESS
PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESSPRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESS
PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESSpattok
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyButlerRubin
 
Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Sagar Rahurkar
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidenceShahid Jamal Tubrazy
 
India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008ValueMentor Consulting
 
What Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure SectorWhat Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure SectorCBIZ, Inc.
 
Sector Focus; Information Technology; Issue 1 February 2010
Sector Focus; Information Technology; Issue 1   February 2010Sector Focus; Information Technology; Issue 1   February 2010
Sector Focus; Information Technology; Issue 1 February 2010kapil_arora
 
How to take down the 911 call center -- NFPA 1221 , Chapter 13
How to take down the 911 call center -- NFPA 1221 , Chapter 13How to take down the 911 call center -- NFPA 1221 , Chapter 13
How to take down the 911 call center -- NFPA 1221 , Chapter 13David Sweigert
 
Cybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioCybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioJLL
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the UnexpectedCharles Mok
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 

What's hot (20)

PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESS
PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESSPRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESS
PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESS
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
 
Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital Evidence
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Hacking3e ppt ch11
Hacking3e ppt ch11Hacking3e ppt ch11
Hacking3e ppt ch11
 
India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008
 
What Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure SectorWhat Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure Sector
 
Sector Focus; Information Technology; Issue 1 February 2010
Sector Focus; Information Technology; Issue 1   February 2010Sector Focus; Information Technology; Issue 1   February 2010
Sector Focus; Information Technology; Issue 1 February 2010
 
Federated and Secure Identity Management in Operation
Federated and Secure Identity Management in OperationFederated and Secure Identity Management in Operation
Federated and Secure Identity Management in Operation
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
How to take down the 911 call center -- NFPA 1221 , Chapter 13
How to take down the 911 call center -- NFPA 1221 , Chapter 13How to take down the 911 call center -- NFPA 1221 , Chapter 13
How to take down the 911 call center -- NFPA 1221 , Chapter 13
 
Cybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioCybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolio
 
It act 2000
It act 2000It act 2000
It act 2000
 
OTN Special Update - SOPA Put on Hold (2012-02-20)
OTN Special Update - SOPA Put on Hold (2012-02-20)OTN Special Update - SOPA Put on Hold (2012-02-20)
OTN Special Update - SOPA Put on Hold (2012-02-20)
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
It act,2000 note
It act,2000 noteIt act,2000 note
It act,2000 note
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the Unexpected
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 

Viewers also liked

Boletin de prensa alcaldesa pronto inaugurará escenario deportivo
Boletin de prensa  alcaldesa pronto inaugurará escenario deportivoBoletin de prensa  alcaldesa pronto inaugurará escenario deportivo
Boletin de prensa alcaldesa pronto inaugurará escenario deportivoDiana Patricia
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentationelparsrent
 
Cv thanasis tziastas 05.01.2015
Cv thanasis tziastas 05.01.2015Cv thanasis tziastas 05.01.2015
Cv thanasis tziastas 05.01.2015THANASIS TZIASTAS
 
Resume Komal Murekar
Resume Komal MurekarResume Komal Murekar
Resume Komal Murekarkomal murekar
 
Blog 2 factores de riesgo del embarazo precoz
Blog 2 factores de riesgo del embarazo precoz Blog 2 factores de riesgo del embarazo precoz
Blog 2 factores de riesgo del embarazo precoz genezambrano-m
 
Flyer-CareerServices
Flyer-CareerServicesFlyer-CareerServices
Flyer-CareerServicesAmanda Cook
 
Analisi della-testa-del-maschio
Analisi della-testa-del-maschioAnalisi della-testa-del-maschio
Analisi della-testa-del-maschioQuellesanderland
 
Vikas Dawar - CV
Vikas Dawar  - CVVikas Dawar  - CV
Vikas Dawar - CVVikas Dawar
 

Viewers also liked (12)

recommendation-Glen
recommendation-Glenrecommendation-Glen
recommendation-Glen
 
Boletin de prensa alcaldesa pronto inaugurará escenario deportivo
Boletin de prensa  alcaldesa pronto inaugurará escenario deportivoBoletin de prensa  alcaldesa pronto inaugurará escenario deportivo
Boletin de prensa alcaldesa pronto inaugurará escenario deportivo
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Cv thanasis tziastas 05.01.2015
Cv thanasis tziastas 05.01.2015Cv thanasis tziastas 05.01.2015
Cv thanasis tziastas 05.01.2015
 
Resume Komal Murekar
Resume Komal MurekarResume Komal Murekar
Resume Komal Murekar
 
3.planta
3.planta3.planta
3.planta
 
Expert Advice
Expert AdviceExpert Advice
Expert Advice
 
Blog 2 factores de riesgo del embarazo precoz
Blog 2 factores de riesgo del embarazo precoz Blog 2 factores de riesgo del embarazo precoz
Blog 2 factores de riesgo del embarazo precoz
 
Flyer-CareerServices
Flyer-CareerServicesFlyer-CareerServices
Flyer-CareerServices
 
Air for one
Air for oneAir for one
Air for one
 
Analisi della-testa-del-maschio
Analisi della-testa-del-maschioAnalisi della-testa-del-maschio
Analisi della-testa-del-maschio
 
Vikas Dawar - CV
Vikas Dawar  - CVVikas Dawar  - CV
Vikas Dawar - CV
 

Similar to New FAR Clause Establishes Minimum Data Security Requirements for Federal Contractors

Cybersecurity 101: Government Contracts
Cybersecurity 101: Government ContractsCybersecurity 101: Government Contracts
Cybersecurity 101: Government ContractsPatton Boggs LLP
 
Government Contractors Now Subject to Cybersecurity Regulations – And More ar...
Government Contractors Now Subject to Cybersecurity Regulations – And More ar...Government Contractors Now Subject to Cybersecurity Regulations – And More ar...
Government Contractors Now Subject to Cybersecurity Regulations – And More ar...Patton Boggs LLP
 
The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1stevemeltzer
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyersNicole Black
 
DoD Implements Broad Cybersecurity Information–Sharing Program
DoD Implements Broad Cybersecurity Information–Sharing Program DoD Implements Broad Cybersecurity Information–Sharing Program
DoD Implements Broad Cybersecurity Information–Sharing Program Patton Boggs LLP
 
GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...
GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...
GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...Patton Boggs LLP
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Raleigh ISSA
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...David Cunningham
 
MBM Achieving HIPAA Compliance Whitepaper
MBM Achieving HIPAA Compliance WhitepaperMBM Achieving HIPAA Compliance Whitepaper
MBM Achieving HIPAA Compliance WhitepaperMBMeHealthCareSolutions
 
Navigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology TransactionsNavigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology TransactionsMMMTechLaw
 
Understanding CJIS Compliance – Information Exchange Agreements
Understanding CJIS Compliance – Information Exchange AgreementsUnderstanding CJIS Compliance – Information Exchange Agreements
Understanding CJIS Compliance – Information Exchange AgreementsDoubleHorn
 
Policies & Laws in IT industry
Policies & Laws in IT industryPolicies & Laws in IT industry
Policies & Laws in IT industryRohana K Amarakoon
 
Cyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK GovernmentCyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK GovernmentDavid Sweigert
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)stevemeltzer
 
Contracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy BortzContracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy Bortzitnewsafrica
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Joe Orlando
 
Network service providers retain records for various lengths of time.pdf
Network service providers retain records for various lengths of time.pdfNetwork service providers retain records for various lengths of time.pdf
Network service providers retain records for various lengths of time.pdfeyevision3
 

Similar to New FAR Clause Establishes Minimum Data Security Requirements for Federal Contractors (20)

Cybersecurity 101: Government Contracts
Cybersecurity 101: Government ContractsCybersecurity 101: Government Contracts
Cybersecurity 101: Government Contracts
 
Government Contractors Now Subject to Cybersecurity Regulations – And More ar...
Government Contractors Now Subject to Cybersecurity Regulations – And More ar...Government Contractors Now Subject to Cybersecurity Regulations – And More ar...
Government Contractors Now Subject to Cybersecurity Regulations – And More ar...
 
The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
 
FAR 'Final Rule' Blog
FAR 'Final Rule' BlogFAR 'Final Rule' Blog
FAR 'Final Rule' Blog
 
DoD Implements Broad Cybersecurity Information–Sharing Program
DoD Implements Broad Cybersecurity Information–Sharing Program DoD Implements Broad Cybersecurity Information–Sharing Program
DoD Implements Broad Cybersecurity Information–Sharing Program
 
GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...
GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...
GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...
 
Key Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government ContractorsKey Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government Contractors
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
MBM Achieving HIPAA Compliance Whitepaper
MBM Achieving HIPAA Compliance WhitepaperMBM Achieving HIPAA Compliance Whitepaper
MBM Achieving HIPAA Compliance Whitepaper
 
Navigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology TransactionsNavigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology Transactions
 
Understanding CJIS Compliance – Information Exchange Agreements
Understanding CJIS Compliance – Information Exchange AgreementsUnderstanding CJIS Compliance – Information Exchange Agreements
Understanding CJIS Compliance – Information Exchange Agreements
 
Policies & Laws in IT industry
Policies & Laws in IT industryPolicies & Laws in IT industry
Policies & Laws in IT industry
 
Cyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK GovernmentCyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK Government
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)
 
GSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through AcquisitionGSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through Acquisition
 
Contracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy BortzContracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy Bortz
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3
 
Network service providers retain records for various lengths of time.pdf
Network service providers retain records for various lengths of time.pdfNetwork service providers retain records for various lengths of time.pdf
Network service providers retain records for various lengths of time.pdf
 

More from Patton Boggs LLP

Crimea: U.S. Response Intensifies As Congress, President Obama Issue More San...
Crimea: U.S. Response Intensifies As Congress, President Obama Issue More San...Crimea: U.S. Response Intensifies As Congress, President Obama Issue More San...
Crimea: U.S. Response Intensifies As Congress, President Obama Issue More San...Patton Boggs LLP
 
Update: Employer Responsibilities Under the Affordable Care Act
Update: Employer Responsibilities Under the Affordable Care ActUpdate: Employer Responsibilities Under the Affordable Care Act
Update: Employer Responsibilities Under the Affordable Care ActPatton Boggs LLP
 
Crimea: U.S. Executive Actions and Legal Implications of Overlapping Global S...
Crimea: U.S. Executive Actions and Legal Implications of Overlapping Global S...Crimea: U.S. Executive Actions and Legal Implications of Overlapping Global S...
Crimea: U.S. Executive Actions and Legal Implications of Overlapping Global S...Patton Boggs LLP
 
Protecting Patient Information - Feds Find Security Lapses in State and Local...
Protecting Patient Information - Feds Find Security Lapses in State and Local...Protecting Patient Information - Feds Find Security Lapses in State and Local...
Protecting Patient Information - Feds Find Security Lapses in State and Local...Patton Boggs LLP
 
American University International Law Review Annual Symposium: Managing the G...
American University International Law Review Annual Symposium: Managing the G...American University International Law Review Annual Symposium: Managing the G...
American University International Law Review Annual Symposium: Managing the G...Patton Boggs LLP
 
Reinsurance Newsletter - March 2014
Reinsurance Newsletter - March 2014Reinsurance Newsletter - March 2014
Reinsurance Newsletter - March 2014Patton Boggs LLP
 
Supreme Court Agrees to Hear Two Cases on Attorneys' Fees in Patent Cases
Supreme Court Agrees to Hear Two Cases on Attorneys' Fees in Patent CasesSupreme Court Agrees to Hear Two Cases on Attorneys' Fees in Patent Cases
Supreme Court Agrees to Hear Two Cases on Attorneys' Fees in Patent CasesPatton Boggs LLP
 
FTC Announces Study of "Patent Assertion Entities"
FTC Announces Study of "Patent Assertion Entities"FTC Announces Study of "Patent Assertion Entities"
FTC Announces Study of "Patent Assertion Entities"Patton Boggs LLP
 
ALJ Ruling on Heart Attack Reporting Requirements Creates Split of Authority
ALJ Ruling on Heart Attack Reporting Requirements Creates Split of AuthorityALJ Ruling on Heart Attack Reporting Requirements Creates Split of Authority
ALJ Ruling on Heart Attack Reporting Requirements Creates Split of AuthorityPatton Boggs LLP
 
New TCPA Requirements for "Prior Express Written Consent" Effective October 16
New TCPA Requirements for "Prior Express Written Consent" Effective October 16New TCPA Requirements for "Prior Express Written Consent" Effective October 16
New TCPA Requirements for "Prior Express Written Consent" Effective October 16Patton Boggs LLP
 
Reinsurance Newsletter ~ September 2013
Reinsurance Newsletter ~ September 2013Reinsurance Newsletter ~ September 2013
Reinsurance Newsletter ~ September 2013Patton Boggs LLP
 
The U.S. Chemical Safety Board to OSHA: Get to Work on Combustible Dust
The U.S. Chemical Safety Board to OSHA: Get to Work on Combustible DustThe U.S. Chemical Safety Board to OSHA: Get to Work on Combustible Dust
The U.S. Chemical Safety Board to OSHA: Get to Work on Combustible DustPatton Boggs LLP
 
The Transatlantic Trade and Investment Partnership: The Intersection of the I...
The Transatlantic Trade and Investment Partnership: The Intersection of the I...The Transatlantic Trade and Investment Partnership: The Intersection of the I...
The Transatlantic Trade and Investment Partnership: The Intersection of the I...Patton Boggs LLP
 
Capital Thinking ~ July 29, 2013
Capital Thinking ~ July 29, 2013Capital Thinking ~ July 29, 2013
Capital Thinking ~ July 29, 2013Patton Boggs LLP
 
Capital Thinking ~ July 22, 2013
Capital Thinking ~ July 22, 2013Capital Thinking ~ July 22, 2013
Capital Thinking ~ July 22, 2013Patton Boggs LLP
 
CFTC Cross-Border Guidance Frequently Asked Questions
CFTC Cross-Border Guidance Frequently Asked QuestionsCFTC Cross-Border Guidance Frequently Asked Questions
CFTC Cross-Border Guidance Frequently Asked QuestionsPatton Boggs LLP
 
Australia Elects a New Federal Government
Australia Elects a New Federal GovernmentAustralia Elects a New Federal Government
Australia Elects a New Federal GovernmentPatton Boggs LLP
 
"Advance Australia Fair" - The Australian Federal Election 2013
"Advance Australia Fair" - The Australian Federal Election 2013"Advance Australia Fair" - The Australian Federal Election 2013
"Advance Australia Fair" - The Australian Federal Election 2013Patton Boggs LLP
 
U.S. Securities and Exchange Commission Proposes New Rule on Pay Disclosure
U.S. Securities and Exchange Commission Proposes New Rule on Pay DisclosureU.S. Securities and Exchange Commission Proposes New Rule on Pay Disclosure
U.S. Securities and Exchange Commission Proposes New Rule on Pay DisclosurePatton Boggs LLP
 

More from Patton Boggs LLP (20)

Crimea: U.S. Response Intensifies As Congress, President Obama Issue More San...
Crimea: U.S. Response Intensifies As Congress, President Obama Issue More San...Crimea: U.S. Response Intensifies As Congress, President Obama Issue More San...
Crimea: U.S. Response Intensifies As Congress, President Obama Issue More San...
 
Update: Employer Responsibilities Under the Affordable Care Act
Update: Employer Responsibilities Under the Affordable Care ActUpdate: Employer Responsibilities Under the Affordable Care Act
Update: Employer Responsibilities Under the Affordable Care Act
 
Crimea: U.S. Executive Actions and Legal Implications of Overlapping Global S...
Crimea: U.S. Executive Actions and Legal Implications of Overlapping Global S...Crimea: U.S. Executive Actions and Legal Implications of Overlapping Global S...
Crimea: U.S. Executive Actions and Legal Implications of Overlapping Global S...
 
Protecting Patient Information - Feds Find Security Lapses in State and Local...
Protecting Patient Information - Feds Find Security Lapses in State and Local...Protecting Patient Information - Feds Find Security Lapses in State and Local...
Protecting Patient Information - Feds Find Security Lapses in State and Local...
 
American University International Law Review Annual Symposium: Managing the G...
American University International Law Review Annual Symposium: Managing the G...American University International Law Review Annual Symposium: Managing the G...
American University International Law Review Annual Symposium: Managing the G...
 
Reinsurance Newsletter - March 2014
Reinsurance Newsletter - March 2014Reinsurance Newsletter - March 2014
Reinsurance Newsletter - March 2014
 
Social Impact Bonds
Social Impact BondsSocial Impact Bonds
Social Impact Bonds
 
Supreme Court Agrees to Hear Two Cases on Attorneys' Fees in Patent Cases
Supreme Court Agrees to Hear Two Cases on Attorneys' Fees in Patent CasesSupreme Court Agrees to Hear Two Cases on Attorneys' Fees in Patent Cases
Supreme Court Agrees to Hear Two Cases on Attorneys' Fees in Patent Cases
 
FTC Announces Study of "Patent Assertion Entities"
FTC Announces Study of "Patent Assertion Entities"FTC Announces Study of "Patent Assertion Entities"
FTC Announces Study of "Patent Assertion Entities"
 
ALJ Ruling on Heart Attack Reporting Requirements Creates Split of Authority
ALJ Ruling on Heart Attack Reporting Requirements Creates Split of AuthorityALJ Ruling on Heart Attack Reporting Requirements Creates Split of Authority
ALJ Ruling on Heart Attack Reporting Requirements Creates Split of Authority
 
New TCPA Requirements for "Prior Express Written Consent" Effective October 16
New TCPA Requirements for "Prior Express Written Consent" Effective October 16New TCPA Requirements for "Prior Express Written Consent" Effective October 16
New TCPA Requirements for "Prior Express Written Consent" Effective October 16
 
Reinsurance Newsletter ~ September 2013
Reinsurance Newsletter ~ September 2013Reinsurance Newsletter ~ September 2013
Reinsurance Newsletter ~ September 2013
 
The U.S. Chemical Safety Board to OSHA: Get to Work on Combustible Dust
The U.S. Chemical Safety Board to OSHA: Get to Work on Combustible DustThe U.S. Chemical Safety Board to OSHA: Get to Work on Combustible Dust
The U.S. Chemical Safety Board to OSHA: Get to Work on Combustible Dust
 
The Transatlantic Trade and Investment Partnership: The Intersection of the I...
The Transatlantic Trade and Investment Partnership: The Intersection of the I...The Transatlantic Trade and Investment Partnership: The Intersection of the I...
The Transatlantic Trade and Investment Partnership: The Intersection of the I...
 
Capital Thinking ~ July 29, 2013
Capital Thinking ~ July 29, 2013Capital Thinking ~ July 29, 2013
Capital Thinking ~ July 29, 2013
 
Capital Thinking ~ July 22, 2013
Capital Thinking ~ July 22, 2013Capital Thinking ~ July 22, 2013
Capital Thinking ~ July 22, 2013
 
CFTC Cross-Border Guidance Frequently Asked Questions
CFTC Cross-Border Guidance Frequently Asked QuestionsCFTC Cross-Border Guidance Frequently Asked Questions
CFTC Cross-Border Guidance Frequently Asked Questions
 
Australia Elects a New Federal Government
Australia Elects a New Federal GovernmentAustralia Elects a New Federal Government
Australia Elects a New Federal Government
 
"Advance Australia Fair" - The Australian Federal Election 2013
"Advance Australia Fair" - The Australian Federal Election 2013"Advance Australia Fair" - The Australian Federal Election 2013
"Advance Australia Fair" - The Australian Federal Election 2013
 
U.S. Securities and Exchange Commission Proposes New Rule on Pay Disclosure
U.S. Securities and Exchange Commission Proposes New Rule on Pay DisclosureU.S. Securities and Exchange Commission Proposes New Rule on Pay Disclosure
U.S. Securities and Exchange Commission Proposes New Rule on Pay Disclosure
 

New FAR Clause Establishes Minimum Data Security Requirements for Federal Contractors

  • 1. New FAR Clause Establishes Minimum Data Security Requirements for September 4, 2012 Federal Contractors Government Contracts Law Client Alert This Alert provides only With Congress unable to pass cybersecurity legislation by the August recess, the general information and executive agencies are proceeding to regulate government contractors with access to should not be relied upon as government information. Specifically, on August 24, 2012, the Federal Acquisition Regulation (FAR) Council proposed a new clause requiring contractors to maintain legal advice. This Alert may minimum data protection standards. Comments on the proposal are due October 23, be considered attorney 2012. As explained below, GSA already has in place cybersecurity standards for its advertising under court and contractors, and DoD has proposed its own set of rules. These specific agency rules bar rules in certain take precedent over this new FAR clause. jurisdictions. Once final, the new FAR clause will apply to civilian, DoD and NASA contracts exceeding the simplified acquisition threshold ($150,000), including commercial acquisitions. The For more information, contact clause must be flowed down to subcontracts at any tier. The new clause, which will be in your Patton Boggs LLP FAR Part 52.204, identifies seven basic safeguards for contractor information systems attorney or the author listed through which nonpublic information generated by or for government either resides or below. transits. The basic safeguards are: 1. Government information may not be processed on computers without access control or Mary Beth Bosco located in public areas. Similarly, government information cannot be posted on a public mbbosco@pattonboggs.com website. If posted to a web site, the site must control access either through user WWW.PATTONBOGGS.COM identification or password, user certificate or other technical means, and must provide protection via use of security technologies. 2. Electronic information may be transmitted only on systems that utilize technologies and processes that provide the best level of security and privacy available, given facilities, conditions and environment. 3. Transmission by voice or fax may only occur when the sender has a reasonable assurance that access is limited to authorized recipients. 4. Systems must be protected by at least one level of physical barrier and one level of electronic barrier, such as lock and key in conjunction with a password, when not in the direct control of the individual user. 5. Media that is being released or discarded must be cleared and sanitized. Overwriting is an acceptable method of sanitizing, and the clause refers to the National Institute of Standards and Testing's (NIST) protocols for clearing computers. NIST Publication 800-88, Guidelines for Media Sanitization. 6. The contractor must provide at least the following means of intrusion protection: Current and regularly updated malware protection, such as anti-virus software and anti-spyware software; and prompt application of security-related upgrades and patches.
  • 2. 7. Information may only be transferred to those subcontractors with a contractual need to have the information and who employ the safeguards described in the clause. While the clause’s requirements are very general, covered contractors will need to review not just their hardware and software systems, but their facilities, employee practices, record-keeping systems, and subcontract relationships in order to ensure compliance. For example, contractors should make sure they have policies in place so that employees working from home comply with the clause’s security requirements. In addition, government contractors must be aware that GSA already has more fulsome cybersecurity regulations in place, and that DOD has proposed a comprehensive set of rules. In brief, GSA’s regulations require contractors to have an IT security plan for each contract that is approved by the Contracting Officer. Contractors must also supply evidence of either a self or third-party-certified security authorization, the components of which are defined by GSA’s regulations. The regulations also contain notification requirements for cyber breaches and GSA inspection rights. DOD's proposal mandates reporting of cyber incidents affecting designated DOD information within 72 hours of discovery. In addition to incident reporting, contractors will need to take immediate action to support forensic activities. These actions include an immediate review of the system to identify compromised computers, servers and user accounts; identification of the specific DOD information that has been affected; and preservation of the known affected systems and any corresponding capture data. In the event DOD determines to perform its own damage assessment, the contractor will be required to comply with all information requests and cooperate with DOD's investigation. The DOD regulations are not expected to become final before the end of the year. This Alert provides only general information and should not be relied upon as legal advice. This Alert may also be considered attorney advertising under court and bar rules in certain jurisdictions. WASHINGTON DC | NEW JERSEY | NEW YORK | DALLAS | DENVER | ANCHORAGE | DOHA, QATAR | ABU DHABI, UAE | RIYADH, SAUDI ARABIA